First published: Tue Jul 17 2018(Updated: )
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sddm Project Sddm | <=0.17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14345 is a vulnerability discovered in SDDM through 0.17.0 that allows any user with access to the system D-Bus to unlock any graphical session if configured with ReuseSession=true.
CVE-2018-14345 has a severity rating of 7.5, which is considered high.
SDDM versions up to and including 0.17.0 are affected by CVE-2018-14345.
Yes, a fix is available for CVE-2018-14345. It can be found in the commit 147cec383892d143b5e02daa70f1e7def50f5d98 on the SDDM GitHub repository.
More information about CVE-2018-14345 can be found in the Bugzilla entry at https://bugzilla.suse.com/show_bug.cgi?id=1101450.